The main use of this product is endpoint security, it is very useful when you are trying to centralize endpoint security management and you want an easy and fast setup, I have used this product in POCs and different size deployments with different kinds of clients. Harmony offers several layers of protection and it fits well with all the Check Point "ecosystem", (It is especially useful when you are correlating security data because it can "talk" with Check Point's XDR Solution in order to get more insights).
Director de Ingenieria at Smartelecom SA de CV
Good visibility with cloud centralized management and several layers of security
Pros and Cons
- "Information is easily managed and protected (which is particularly useful in lost or stolen endpoints)."
- "If the IT department is used to "cloning" endpoints (making images) you are going to have a hard time trying to install the product and you are going to end up reading a lot of Check Point documents."
What is our primary use case?
How has it helped my organization?
There are several benefits that you can get with this solution:
1) You get centralized management of endpoints in your organization and you can be very granular in order to create endpoint security policies for different user groups. This improves overall security and visibility for IT departments.
2) Visibility also offers improvement with purchases and making decisions.
3) Information is easily managed and protected (which is particularly useful in lost or stolen endpoints).
4) It can be used with an XDR system (which is very useful with SOCs).
What is most valuable?
The most valuable aspects include:
1) Cloud Centralized management. This is particularly useful since you don't have to use any on-premise server, the cloud dashboard is activated without a minimum license number.
2) Several layers of security. It is well aligned with actual threats like ransomware and zero-day attacks and offers traditional layers of security.
3) Visibility. You have a single dashboard for all endpoint information that you need from an IT administrative perspective and in a threat incident you are properly advised.
What needs improvement?
There are some "weak points" that have to be mentioned, including:
1) If the IT department is used to "cloning" endpoints (making images) you are going to have a hard time trying to install the product and you are going to end up reading a lot of Check Point documents.
2) If you are used to the granularity of roles features in Check Point Quantums products you are going to be a little bit disappointed. You can't set customized roles with customized read/write permissions.
3) You need a mature security team to manage this solution in order to get the most value from it.
Buyer's Guide
Check Point Harmony Endpoint
June 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
For how long have I used the solution?
I've used this product since its release.
What do I think about the stability of the solution?
The solution is very stable in the correct context; with its cloud nature, it is unlikely to have any downtime.
What do I think about the scalability of the solution?
The solution is very scalable since the console is a cloud; you only have to buy more licenses in order to grow.
How are customer service and support?
TAC is very useful and its dashboard is very intuitive. You can get web, mail, and telephone support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used several solutions, such as Symantec, ESET, and Kaspersky.
How was the initial setup?
The initial setup is straightforward. It is very fast due to its cloud nature.
What about the implementation team?
We implemented the solution with the help of a vendor team; they have good documentation and are experts.
What was our ROI?
The ROI is very hard to measure. It is best to take a proactive posture of protecting your assets.
What's my experience with pricing, setup cost, and licensing?
It is a very good security product yet it is not the cheapest one. Licensing is very easy to understand and it includes Check Point TAC support.
Which other solutions did I evaluate?
We evaluated various solutions, including Symantec, ESET, Trellix, and Kaspersky.
What other advice do I have?
It is a very mature solution and one of the most secure that exists in the security market share.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Senior Solution Consultant at a tech services company with 51-200 employees
Provides top-tier security leading to reduced incident duration and improved compliance
Pros and Cons
- "Check Point Harmony Endpoint offers top tier security, AI-powered threat prevention, and strong scalability, which stand out as the best features."
- "The integration challenges with Check Point Harmony Endpoint involve needing support with other third-party applications that I wish it worked with more seamlessly."
What is our primary use case?
My main use case for Check Point Harmony Endpoint is that we use it as an EDR solution for all our endpoints.
My team uses Check Point Harmony Endpoint primarily as an EDR solution focused on threat detection and incident response.
What is most valuable?
Check Point provides zero-day protection, which helps us significantly with our security regarding our main use case.
Check Point Harmony Endpoint offers top tier security, AI-powered threat prevention, and strong scalability, which stand out as the best features.
The AI-powered threat prevention in Check Point Harmony Endpoint helps us to detect and prevent sophisticated attacks, and its scalability means it can be deployed across various devices and environments, helping us daily.
Check Point Harmony Endpoint has positively impacted our organization by providing shorter incidents and better compliance.
Our incident response has increased by 5 to 10%, which showcases specifics on how much the incident duration has decreased and how compliance has improved.
What needs improvement?
Check Point Harmony Endpoint could be improved by integrating with multiple other security solutions.
The integration challenges with Check Point Harmony Endpoint involve needing support with other third-party applications that I wish it worked with more seamlessly.
That is my main concern regarding needed improvements to Check Point Harmony Endpoint.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for almost three years.
How are customer service and support?
The customer support for Check Point Harmony Endpoint is good.
I would rate the customer support for Check Point Harmony Endpoint an eight on a scale of 1 to 10.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I used Broadcom earlier before Check Point Harmony Endpoint and switched because it is a better solution than Broadcom.
How was the initial setup?
The initial setup with Check Point Harmony Endpoint was straightforward.
What was our ROI?
I have seen a return on investment as fewer employees are required to manage the solution.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup costs, and licensing has been all good with Check Point Harmony Endpoint.
Which other solutions did I evaluate?
Before choosing Check Point Harmony Endpoint, I evaluated other options, which included Palo Alto and SentinelOne.
What other advice do I have?
Check Point Harmony Endpoint is stable.
Check Point Harmony Endpoint's scalability is very good.
My advice to others looking into using Check Point Harmony Endpoint is to go for it; it is the best solution.
I give Check Point Harmony Endpoint a rating of nine out of ten because I am getting good compliance and fewer incident responses.
I do not have any additional thoughts about Check Point Harmony Endpoint as of now.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: May 16, 2025
Flag as inappropriateBuyer's Guide
Check Point Harmony Endpoint
June 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
Technical Director at Geekz Information Technology
Well-designed for security needs and has built-in features
Pros and Cons
- "Stability is good, and the product is well-designed for security needs."
- "Endpoint protection is valuable. Stability is good, and the product is well-designed for security needs."
- "Support needs improvement."
- "Support needs improvement. Currently, support is primarily via email, which leads to longer response times."
What is our primary use case?
We work with Check Point Harmony Endpoint as partners, providing deployment services, particularly for small to medium enterprises (SMEs). We work with both small and large companies.
What is most valuable?
Endpoint protection is valuable. Stability is good, and the product is well-designed for security needs. It is scalable and offers multiple features, which justify its pricing for enterprise customers. Since security is a major concern, we do not worry about the pricing as the product has features built-in.
What needs improvement?
Support needs improvement. Currently, support is primarily via email, which leads to longer response times. Fine-tuning for applications and better support from Harmony would be helpful, especially once the environment is hardened. Better technical support would enhance the product's competitiveness.
For how long have I used the solution?
We have been working with Check Point Harmony Endpoint for almost five years.
What do I think about the stability of the solution?
Stability is fine, and the product performs well in terms of security. It is considered well and good.
What do I think about the scalability of the solution?
Check Point Harmony Endpoint is scalable, suitable for both small and large companies.
How are customer service and support?
Support service needs improvement. Only email support is available, leading to delays in getting assistance.
How would you rate customer service and support?
Negative
How was the initial setup?
Implementation is straightforward for smaller environments, however, requires significant fine-tuning for larger clients.
What about the implementation team?
We only handle deployment and do not deal with pricing, which is taken care of by another department.
What's my experience with pricing, setup cost, and licensing?
Pricing is a bit expensive but justified by the product’s features, capabilities, and scalability. It is suitable for enterprises but can be challenging to position for small to medium customers.
What other advice do I have?
We recommend Check Point Harmony Endpoint; however, support needs enhancement. With improved support, it could outperform competitors. Rating based on the alone featureset is nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Nov 24, 2024
Flag as inappropriateIT Manager at Bolger Brothers Inc.
Manages to capture more spam with a smaller footprint
Pros and Cons
- "This comprehensive approach can safeguard your organization from a wider range of threats, including ransomware, malware, phishing attacks, and zero-day exploits."
- "I would like to see a better UI for admin functions."
What is our primary use case?
We use Check Point to manage email security in our O365 environment. Our previous solution was unable to remove all of the email spam we had. Check Point integrates with Office 365 to provide advanced threat protection for email. It uses techniques like anti-virus, URL filtering, and threat emulation to stop known and unknown threats. It also offers goes beyond email security. It protects all aspects of Office 365 collaboration tools like SharePoint, OneDrive, and Teams. It can prevent data loss, enforce policy compliance, and block phishing attacks.
How has it helped my organization?
It manages to capture more spam with a smaller footprint. It has a single agent and management console to streamline security administration. This can save IT staff time and resources compared to managing multiple security products. The endpoint combines Endpoint Protection Platform (EPP), Endpoint Detection and Response (EDR), and Extended Detection and Response (XDR) capabilities.
This comprehensive approach can safeguard your organization from a wider range of threats, including ransomware, malware, phishing attacks, and zero-day exploits.
What is most valuable?
Ease of setup and ability to hook into O365 directly without MX record changes. Check Point offers advanced threat prevention capabilities, including SandBlast Network Threat Emulation and Threat Extraction. These features can identify and stop even unknown threats by simulating real-world attacks in a safe environment. Check Point solutions are designed to scale to meet the needs of large organizations. They can handle high volumes of traffic without compromising performance. Check Point integrates with a wide range of third-party security solutions. This allows you to create a comprehensive security ecosystem that meets your specific needs.
What needs improvement?
I would like to see a better UI for admin functions. While CheckPoint offers threat prevention through SandBlast, some users feel even deeper integration of Machine Learning (ML) could enhance threat detection and improve automation. This could involve automating security responses and offering threat prediction capabilities. As organizations increasingly move to the cloud, Check Point could further strengthen its cloud-native security offerings. This might involve expanding support for various cloud platforms and offering more granular security controls within those environments.
For how long have I used the solution?
I have used Check Point Harmony Endpoint for six months.
What do I think about the stability of the solution?
We haven't had issues or outages so far.
What do I think about the scalability of the solution?
It seems to be able to scale to any size company.
How are customer service and support?
Their support has been very positive. It's easy to use.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Sophos was our previous vendor, we found their coverage lacking.
How was the initial setup?
The setup was straightforward, it's hands-on config.
What about the implementation team?
CDW was our MSP.
What was our ROI?
We expect to see ROI in 12-16 months.
What's my experience with pricing, setup cost, and licensing?
My advice would be to state terms upfront and always ask to haggle down.
Which other solutions did I evaluate?
We looked at Fortinet, Palo Alto, Crowdstrike, etc.
What other advice do I have?
Make sure to review your solutions every couple years as technology changes.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Business Developer Manager at PROCOM
Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering
Pros and Cons
- "The level of security and visibility they provide is great and it is very easy to configure and maintain."
- "We would also like the application control module to be further developed in future versions to include applications commonly used or maintained by Check Point in order to be able to configure blocking policies more quickly."
What is our primary use case?
We use it for the complete protection of more than 5,000 devices of our company and our customers.
We have Harmony Endpoint (Advanced) managed from the Check Point Cloud, mostly for Microsoft Windows 7, 8, and 10 devices, as well as Windows Servers (mostly 2012 and 2019). We also have a few protected Linux desktops and server devices.
As for the protections enabled, we have mainly Threat Prevention (including Antimalware, Antibot, Anti-ransomware, EDR, and Threat Emulation/sandboxing); Firewall, application control, compliance, and port protection modules deployed.
How has it helped my organization?
We used to use other security solutions (Windows Defender and Kaspersky), however, we had security incidents that affected us (viruses and ransomware) and they were very difficult to identify or when we did identify them it was already a long time after the incident occurred and we did not know the cause and therefore affected the operability of our company considerably.
Since we made the decision to move to Check Point Harmony we have had greater visibility of everything that happens on our devices and take a preventive approach rather than a reactive strategy, in addition to being more confident that we have Check Point protecting us.
What is most valuable?
The characteristics that we find most valuable are its anti-ransomware protection, zero-day phishing protection, web browsing filtering, and vulnerability and patch management. The level of security and visibility they provide is great and it is very easy to configure and maintain. We have almost no false positives.
A feature that we really like is the ease of management and administration that Check Point offers us, in addition to including the management server in its cloud and the predefined dashboards and reports.
What needs improvement?
We would love to have more endpoint hardware and software inventory, as well as tools to perform troubleshooting directly on the endpoint remotely.
A further point of improvement would be to be able to optimize the consumption of resources on the device.
We would also like the application control module to be further developed in future versions to include applications commonly used or maintained by Check Point in order to be able to configure blocking policies more quickly.
For how long have I used the solution?
We have been using this product for more than three years.
What do I think about the stability of the solution?
We have not had any problems with stability so far. It has left us with a good impression.
What do I think about the scalability of the solution?
The scalability of cloud management is excellent.
How are customer service and support?
On the few times we have required support, it has taken us some time to resolve the issues completely, however, in the end, it was accomplished.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We changed solutions since what we had was not effective against the attacks we see today; besides, the visibility was very low and the management was very complicated.
How was the initial setup?
The initial deployment was simple and the solution gave us several tools to do so.
What about the implementation team?
We deployed via an in-house team.
What was our ROI?
In three years, the expected ROI was achieved.
What's my experience with pricing, setup cost, and licensing?
The management of the solution is very simple and the deployment tools are diverse, which greatly reduces the workload. Licensing is also quite simple with three main options and some add-ons.
It is licensed per device (whether it is a desktop, laptop, server, etc.), and the price is very attractive and competitive.
Which other solutions did I evaluate?
We evaluated other options including Cisco AMP and Fortinet EDR.
What other advice do I have?
I'd recommend users to be careful with low-resource devices as the solution has several security modules that can affect the performance of these devices. In our case, we had some old machines where we grouped them and created a more optimized policy for these legacy devices.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer. We are a Check Point customer and partner.
Enhances our organization's cybersecurity posture with its comprehensive set of features
Pros and Cons
- "The Management interface of the product is relatively user-friendly and easy to navigate."
What is our primary use case?
Our primary use case is to enhance the organization's security posture against attacks like phishing, and malware especially zero-day threats, with low false positives. The product must be able to integrate with the existing infrastructure with relative ease.
We need detailed reporting and forensics analysis tools for incident response, and the management console must be user-friendly.
We need to improve operational efficiencies in managing endpoints and thousands of users, given the increasing number of remote workforce. There should be minimal impact on endpoints.
How has it helped my organization?
The management interface of the product is relatively user-friendly and easy to navigate.
The product manages to block most zero-day attacks and unknown threats in real-time, thus reducing the manual overhead by being the first layer of protection against unknown attacks, easing the workload on the monitoring team, and enabling the team to focus on other tasks simultaneously.
Overall, the product enhances our organization's cybersecurity posture with its comprehensive set of features, supported by a leaner monitoring team.
What is most valuable?
The product is quite easy to configure and can be deployed in under half an hour.
It has a centralised management console, single panel to triage, escalate, mitigate and respond.
The agent is lightweight on the endpoints and operates seamlessly in the background with minimal impact on the performance of the endpoints.
It has features like firewalling, removable device control, VPN, app control, DLP, file sandboxing, ransomware protection. which can be turned on or off per endpoint, groups, employees.
What needs improvement?
It should reduce CPU and memory usage. Its technical support could be more timely though it is still acceptable.
It is painful to get deep informational logs to be exported to a SIEM as Check Point requires a user to use its tooling Horizon.
At times, it repeatedly scans the same files without any effective results.
It lacks granular management and configuration.
Additionally, users may encounter challenges with the product's components not performing as anticipated, necessitating the manual addition of exclusions across various areas.
For how long have I used the solution?
We have been using Check Point Harmony Endpoint for less than three months.
What do I think about the stability of the solution?
The stability is acceptable.
What do I think about the scalability of the solution?
The scalability is okay.
How are customer service and support?
The support could be faster.
How would you rate customer service and support?
Neutral
How was the initial setup?
The setup could be done in less than 30 minutes.
What's my experience with pricing, setup cost, and licensing?
The licensing is pricy, so weigh the pros and cons.
Which other solutions did I evaluate?
We looked at CrowdStrike and Palo Alto.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Granular and resilient with many robust features
Pros and Cons
- "The real-time threat prevention capabilities stand out as a fortress against malware, ransomware, and evolving cyber threats, offering a proactive defense that safeguards our organization's critical assets."
- "Enhanced behavioral analytics would provide a deeper understanding of endpoint activities, fortifying our defenses against sophisticated cyber adversaries."
What is our primary use case?
In the intricate web of digital landscapes, my primary use of Check Point Endpoint Security is a guardian for my organization's digital footprint. This robust solution stands as a vigilant sentinel, meticulously securing each endpoint against the relentless tide of cyber threats.
Its dynamic threat prevention capabilities, seamlessly integrated into our environment, create an impervious shield against malware, ransomware, and other malicious actors.
With an intuitive interface and real-time monitoring, it not only defends but also empowers, allowing me to traverse the digital domain with confidence.
In this narrative of cyber resilience, Check Point Endpoint Security is not just a tool; it ensures that every endpoint under its watch remains secure in our interconnected digital ecosystem.
How has it helped my organization?
The integration of Check Point Endpoint Security has been a transformative force within my organization.
As we embraced this robust solution, a paradigm shift occurred – a palpable enhancement in our digital resilience. The advanced threat prevention mechanisms woven into the fabric of Check Point have acted as an impenetrable shield, thwarting malicious intruders and fortifying the security posture of every endpoint.
This newfound defense has not only safeguarded our sensitive data but has also instilled a sense of confidence among our team members, enabling them to navigate the digital realm without fear.
What is most valuable?
Check Point Endpoint Security has proven to be a beacon of resilience, with its multifaceted features illuminating our defense strategy. The real-time threat prevention capabilities stand out as a fortress against malware, ransomware, and evolving cyber threats, offering a proactive defense that safeguards our organization's critical assets.
The granular control over endpoint activities empowers us to tailor security policies, ensuring a bespoke approach that aligns with our unique operational needs. The intuitive dashboard and centralized management streamline our security operations, enhancing efficiency and providing a comprehensive overview of our digital landscape.
Notably, the seamless integration with other security components orchestrates a harmonious defense orchestra, fostering collaboration and maximizing the synergy of our security infrastructure.
In this narrative of fortified cybersecurity, it's the amalgamation of these features that makes Check Point Endpoint Security an invaluable guardian, fortifying our digital realm against the relentless march of cyber threats.
What needs improvement?
A robust threat intelligence integration could elevate proactive defense, offering real-time insights to anticipate and thwart emerging threats more effectively.
Enhanced behavioral analytics would provide a deeper understanding of endpoint activities, fortifying our defenses against sophisticated cyber adversaries.
Streamlined incident response tools within the platform would empower security teams to react swiftly and decisively in the face of potential breaches. Integration with emerging technologies, such as artificial intelligence and machine learning, could usher in a new era of adaptive and self-learning security protocols.
Furthermore, a user-friendly interface for custom reporting and analytics would empower organizations to derive actionable insights from security data. In this ongoing narrative of cybersecurity evolution, the inclusion of these features in the next release would undoubtedly fortify Check Point Endpoint Security as an even more comprehensive and dynamic guardian in the ever-expanding digital frontier.
For how long have I used the solution?
I've used the solution for more than three years.
What do I think about the stability of the solution?
The solution is very stable.
What do I think about the scalability of the solution?
The scalability is very good.
How are customer service and support?
The technical support is excellent.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used to use Kaspersky, and we switched for security reasons.
How was the initial setup?
The initial setup was straightforward; it was easy.
What about the implementation team?
We handled the setup in-house.
What's my experience with pricing, setup cost, and licensing?
Its price is competitive.
Which other solutions did I evaluate?
We also evaluated Trend Micro.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner integrator
Advanced threat protection and reduced incidents improve efficiency and security
What is our primary use case?
My main use case for Check Point Harmony Endpoint is to use it as an EDR in our endpoint solution, endpoints.
Check Point Harmony Endpoint helps us with advanced threat protection, malware, and everything that can raise security concerns with the endpoint.
I don't have anything else to add about my main use case or how it fits into my overall security strategy.
What is most valuable?
In my opinion, the best features Check Point Harmony Endpoint offers are advanced threat protection, ransomware protection, phishing and malware prevention, centralized management, and generative AI protection. All these features stand out for me.
The centralized management and AI protection of Check Point Harmony Endpoint help us to easily deploy all the endpoints, new endpoints, centrally monitor them, policy enforcement, and everything. It has increased our efficiency.
Check Point Harmony Endpoint has positively impacted my organization by reducing incidents.
Since implementing Check Point Harmony Endpoint, my incidents have reduced by around 15 to 20%.
What needs improvement?
I hope the agent size of Check Point Harmony Endpoint could be reduced for improvement.
The agent size has affected my experience by causing some performance issues with old machines where RAM was less than 8GB.
I don't want to add more about the needed improvements or anything else that could make my experience better.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for almost two years.
What do I think about the scalability of the solution?
The scalability of Check Point Harmony Endpoint is rated as eight out of ten.
How are customer service and support?
The customer support is rated as nine out of ten.
I would rate the customer support on a scale of 1 to 10 as nine.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I previously used Broadcom because it was an age-old solution and we don't use it anymore.
What was our ROI?
I have seen a return on investment with time saved because we don't get too many incidents now.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing is satisfactory.
Which other solutions did I evaluate?
Before choosing Check Point Harmony Endpoint, I did not evaluate other options.
What other advice do I have?
My advice to others looking into using Check Point Harmony Endpoint is to go for it.
I choose nine instead of another rating because if the agent size was less, I would have given 10.
My company does not have a business relationship with this vendor other than being a customer.
I was not offered a gift card or incentive for this review.
I rate Check Point Harmony Endpoint a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Jul 3, 2025
Flag as inappropriate
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Fortinet FortiEDR
SentinelOne Singularity Complete
Microsoft Defender XDR
Cortex XDR by Palo Alto Networks
Fortinet FortiClient
HP Wolf Security
Elastic Security
Trellix Endpoint Security Platform
Symantec Endpoint Security
Kaspersky Endpoint Security for Business
Trend Vision One Endpoint Security
Huntress Managed EDR
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?
- Which ransomware is the biggest threat in 2020?